First published: Thu Aug 12 2021(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libspf2 Libspf2 | <1.2.11 | |
Redhat Enterprise Linux | =7.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
debian/libspf2 | 1.2.10-7.1~deb11u1 1.2.10-7.2 1.2.10-8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20314 is a stack buffer overflow vulnerability in libspf2 versions below 1.2.11 that can lead to denial of service and potentially code execution.
CVE-2021-20314 has a severity rating of 9.8 (Critical).
Libspf2 versions below 1.2.11, Redhat Enterprise Linux 7.0, and Fedoraproject Fedora 33, 34, and 35 are affected.
CVE-2021-20314 can be exploited by processing certain SPF macros in malicious crafted SPF explanation messages.
Yes, you can find more information on CVE-2021-20314 at the following references: [Bugzilla Redhat](https://bugzilla.redhat.com/show_bug.cgi?id=1993070), [Fedoraproject Fedora 33](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMSFT2NJDZ7PATRZSQPAOGSE7JD6ELOB/), [Fedoraproject Fedora 34](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJRHPE5OSCPTNA3ZZ4ORDHT4JQH3Y4/).